AD – Bonus Content

AD – Scripts

Ultimate Active Directory Scripts for Pentesters If you want to go from low-priv to domain dominance, this is your toolkit. Below you’ll find all the major scripts used in real-world AD exploitation — with commands and inline comments to explain what they do. Active Directory Enumeration Scripts 1. PowerView 2. SharpHound / BloodHound 3. ADRecon

AD – Scripts Read More »

Master AD Exploitation

How to Master Active Directory Exploitation: A Practical Blueprint Active Directory (AD) isn’t just a single service — it’s an entire identity ecosystem. To become effective at exploiting it, you need to understand how the parts fit together: authentication, trust, delegation, permissions, and misconfigurations. This guide is your direct path to mastering AD exploitation. 1.

Master AD Exploitation Read More »

Constrained Delegation Attack e.g.

Constrained Delegation Attack Path – Full Workflow Example Goal: Start as a low-privileged domain user and escalate to a server-level administrator using Constrained Delegation abuse. Lab Environment (Fictional Setup): Component Name Domain Name intranet.offensive.local Domain Controller DC01.intranet.offensive.local Web Server WEB01.intranet.offensive.local SQL Server SQL01.intranet.offensive.local Tier 1 Admin t1_john.murphy Service Account svcWebApp Your Low-Priv User alice.reed Step-by-Step

Constrained Delegation Attack e.g. Read More »

Access Control Entry (ACE’s)

BloodHound-Relevant ACE Permissions (Access Rights) Permission What It Lets You Do What You Can’t Do GenericAll Full control over the object — add/remove members, reset passwords, modify ACLs N/A — this is the highest possible permission GenericWrite Modify most properties (e.g., member, description, servicePrincipalName) Can’t edit the object’s DACL or owner WriteOwner Change the owner

Access Control Entry (ACE’s) Read More »

AD More Enum

Active Directory More Enumeration This post serves as a reference sheet for enumerating Active Directory (AD) environments using a combination of graphical and command-line methods. It includes usage of runas, RDP sessions, MMC (Microsoft Management Console), and the classic net command — all practical and stealthy methods to gather critical domain information. Credential Injection with

AD More Enum Read More »

Kerberos in Detail

What is Kerberos? Kerberos is the default authentication protocol in modern Windows Active Directory environments. It’s like a digital passport system: The Core Players in Kerberos Let’s introduce the main characters: Role Description Client The user’s computer User You, logging in Service What you want to access (e.g., file share, SQL server) KDC (Key Distribution

Kerberos in Detail Read More »

Scroll to Top